<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Sowmiya SP on Medium]]></title>
        <description><![CDATA[Stories by Sowmiya SP on Medium]]></description>
        <link>https://medium.com/@s.p.sowmiya?source=rss-49587fed0b7a------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/0*2dmrh77q1dJzp1dS</url>
            <title>Stories by Sowmiya SP on Medium</title>
            <link>https://medium.com/@s.p.sowmiya?source=rss-49587fed0b7a------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sat, 23 May 2026 15:33:06 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@s.p.sowmiya/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Encoding Vs Encryption]]></title>
            <link>https://medium.com/@s.p.sowmiya/encoding-vs-encryption-912d55351d6c?source=rss-49587fed0b7a------2</link>
            <guid isPermaLink="false">https://medium.com/p/912d55351d6c</guid>
            <dc:creator><![CDATA[Sowmiya SP]]></dc:creator>
            <pubDate>Fri, 20 Oct 2023 01:28:11 GMT</pubDate>
            <atom:updated>2023-10-20T01:28:11.359Z</atom:updated>
            <content:encoded><![CDATA[<p>Both encoding and encryption are used to represent data in different format but they facilitate different purposes.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*yorKpqG8s1IR0ln_y8QUow.jpeg" /><figcaption>Image from Pixabay</figcaption></figure><p><strong>Encoding</strong></p><p>Encoding is used to ensure that data can be exchanged between different systems that use different character sets. It facilitates interoperability between systems.</p><p>Anyone can encode data and decode it back to its original form using commonly available encoding schemes. It is intended for data representation, not for data security.</p><p><strong>Example</strong>: Base64 encoding for binary data, URL encoding for special characters in URLs, and UTF-8 encoding for text</p><p><strong>Encryption</strong></p><p>Encryption is mainly used for data security. It prevents data from unauthorized access.</p><p>It is typically done using an encryption algorithm and an encryption key.</p><p>Encryption algorithms are logical operations that determine how the data will be transformed from its original form(plain text) to encrypted form(cipher text).</p><p>Most commonly used encryption algorithms are AES(Advanced Encryption Standard), RSA(Rivest-Shamir-Adleman)</p><p>In summary, encoding focuses on interoperability, allowing different systems to understand and exchange data. It does not provide security against unauthorized access. On the other hand, encryption prioritizes data security by converting data in a way that it can only be deciphered by those with the appropriate decryption keys, ensuring confidentiality.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=912d55351d6c" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>